Cybersecurity - Page 16 of 31 - Business2Community
  • Home
  • Category: Cybersecurity

Cybersecurity

Point-of-Sale Systems: The New Target for Malicious Actors

Follow these steps to stop dealing with disastrous security setbacks and start thinking more about the future. Last month, hackers…

Connor Brooke
September 3, 2019
Cybersecurity

CIA Triad: Best Practices for Securing Your Org

Navigating the labyrinth of cybersecurity can be confusing without a framework. On the other hand, force-fitting a prescriptive security framework…

Connor Brooke
August 21, 2019
Cybersecurity

IoT Security: A Simple Matter of Common Sense for Product Developers and Investors

Security basics should be part of any MVP. Period After almost 5 years (at least) of constant media coverage around…

James Spillane
August 15, 2019
Cybersecurity

Is Shadow IT Still a Problem?

Shadow IT: you’ve probably heard of it. Also known as Stealth IT, this refers to information technology (IT) systems built…

Jay Leonard
August 7, 2019
Cybersecurity

How Monitoring Software Can Help Manage GDPR Expectations While Encouraging Investment

The latest PwC and CB Insights MoneyTree Report revealed that venture capital funding in the U.S. is booming, approaching dot-com…

James Spillane
August 7, 2019
Cybersecurity

3 Threats that Compromise your Privacy on Social Media

There’s been a lot of news about the mining of our personal data by companies (and countries) to use for…

Jay Leonard
July 28, 2019
Cybersecurity

How to Keep Cybercrime at Bay: The Ultimate Beginner’s Guide

You can fall victim to cybercrime right this instance. Well, unless, of course, you know how to protect yourself against…

Connor Brooke
July 18, 2019
Cybersecurity

What Is Two-Factor or Multi-Factor Authentication?

Traditional password-and-username authentication can leave users vulnerable. In 2010 Christopher Chaney, a celebrity-obsessed cyber-stalker, got hold of a number of…

Alan Draper
July 7, 2019
Cybersecurity

Mobile App Security is Critical to Business Relevance

Mobile apps have become an integral part of our daily lives. The emergence of mobile apps after the release of…

Alan Draper
June 26, 2019
Cybersecurity

If Your Business Experienced a Data Breach, Is It Prepared?

One of the core principles of the GDPR is that businesses must be prepped and ready to execute the requisite…

Connor Brooke
June 24, 2019
Cybersecurity

How Hackers Use Employees to Access Your Network

Computer hackers are located throughout the entire world. Most hackers work around the clock looking for vulnerable systems. What exactly…

Jay Leonard
June 20, 2019
Cybersecurity

Stay Informed, Sign Up for Our Exclusive Newsletter!

By signing up you agree that you have read our privacy policy.
You’re now signed up!